nuclei-templates/http/cves/2022/CVE-2022-25481.yaml

63 lines
2.1 KiB
YAML

id: CVE-2022-25481
info:
name: ThinkPHP 5.0.24 - Information Disclosure
author: caon
severity: high
description: |
ThinkPHP 5.0.24 is susceptible to information disclosure. This version was configured without the PATHINFO parameter. This can allow an attacker to access all system environment parameters from index.php, thereby possibly obtaining sensitive information, modifying data, and/or executing unauthorized operations.
impact: |
An attacker can exploit this vulnerability to gain sensitive information.
remediation: |
Upgrade to a patched version of ThinkPHP or apply the necessary security patches.
reference:
- https://github.com/Lyther/VulnDiscover/blob/master/Web/ThinkPHP_InfoLeak.md
- https://nvd.nist.gov/vuln/detail/CVE-2022-25481
- https://github.com/20142995/sectool
- https://github.com/ARPSyndicate/cvemon
- https://github.com/ARPSyndicate/kenzer-templates
classification:
cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
cvss-score: 7.5
cve-id: CVE-2022-25481
cwe-id: CWE-668
epss-score: 0.01261
epss-percentile: 0.85591
cpe: cpe:2.3:a:thinkphp:thinkphp:5.0.24:*:*:*:*:*:*:*
metadata:
verified: true
max-request: 1
vendor: thinkphp
product: thinkphp
shodan-query:
- title:"ThinkPHP"
- http.title:"thinkphp"
- cpe:"cpe:2.3:a:thinkphp:thinkphp"
fofa-query:
- title="thinkphp"
- header="think_lang"
google-query: intitle:"thinkphp"
tags: cve,cve2022,thinkphp,exposure,oss
http:
- method: GET
path:
- '{{BaseURL}}/index.php?s=example'
matchers-condition: and
matchers:
- type: word
part: body
words:
- "Exception"
- "REQUEST_TIME"
- "ThinkPHP Constants"
condition: and
- type: status
status:
- 200
- 500
- 404
condition: or
# digest: 4a0a00473045022100d1c235f1ca5801d3b9ffe3eb43ba0b79b746356a0fc112738d5ed3882489350802200af2dd9bc42f4297d28fd09fd942069f6e72126b3d7b3dad665235cf0f94cb9b:922c64590222798bb761d5b6d8e72950